Reply To: OCU ISSO D Week 02 Lesson 08 Discussion
Hi Kelly! You have provided a great comparison between symmetric and asymmetric cryptography. It’s interesting to know how symmetric cryptography uses the same key for encryption and decryption while asymmetric cryptography uses a pair of keys – one public and one private. Your points about the pros and cons of each type are also informative.
One example to consider for symmetric cryptography is the Advanced Encryption Standard (AES) used by many companies to secure their data. As for asymmetric cryptography, a popular example is the RSA algorithm which is widely used in secure communication protocols like SSL/TLS.
I completely agree with you that the validation of key pair ownership in asymmetric cryptography can be time-consuming and exposure, destruction, or loss of private keys can compromise the integrity of the system. For symmetric cryptography, key exchange is often a challenge as it has to be done out-of-band and can potentially be insecure.